tustvold commented on issue #5332:
URL: https://github.com/apache/arrow-rs/issues/5332#issuecomment-1909638747

   It isn't an issue IMO if the reader panics on malformed data, this is a 
perfectly safe and well-defined behaviour. We should try to avoid it, but its 
not like UB where it would indicate a bug. Panics are just exceptions.
   
   The bigger issue with untrusted/malicious inputs is avoiding the reader 
getting stuck in infinite loops or exploding the memory usage. I'm not sure how 
easy such things are to catch using a fuzz testing framework.
   
   With regards to parquet, I can't help feeling the format is sufficiently 
complex that supporting untrusted input is essentially a fools errand though...
   
   That's all to say adding fuzzing support would be a nice add. I'm not too 
familiar with the Rust ecosystem's support for it, but @crepererum may know 
more.
   
   .
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to